Searched defs:found (Results 1 - 25 of 36) sorted by relevance

12

/system/bt/bta/mce/
H A Dbta_mce_act.c64 int found = 0; local
93 evt_data.mas[found].scn = pe.params[0];
98 evt_data.mas[found].p_srv_name = (char *) p_attr->attr_value.v.array;
99 evt_data.mas[found].srv_name_len= SDP_DISC_ATTR_LEN(p_attr->attr_len_type);
104 evt_data.mas[found].instance_id = p_attr->attr_value.v.u8;
109 evt_data.mas[found].msg_type = p_attr->attr_value.v.u8;
111 found++;
112 } while (p_rec != NULL && found < BTA_MCE_MAX_MAS_INSTANCES);
114 evt_data.num_mas = found;
/system/core/base/
H A Dstrings.cpp38 size_t found; local
40 found = s.find_first_of(delimiters, base);
41 result.push_back(s.substr(base, found - base));
42 base = found + 1;
43 } while (found != s.npos);
/system/bt/btif/co/
H A Dbta_gatts_co.c71 BOOLEAN found = FALSE; local
80 found = TRUE;
85 if (!found)
/system/security/keystore/tests/
H A Dauth_token_table_test.cpp105 const hw_auth_token_t* found; local
107 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(1), KM_PURPOSE_SIGN, 0, &found));
108 EXPECT_EQ(1U, found->user_id);
109 EXPECT_EQ(2U, found->authenticator_id);
111 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(2), KM_PURPOSE_SIGN, 0, &found));
112 EXPECT_EQ(1U, found->user_id);
113 EXPECT_EQ(2U, found->authenticator_id);
115 ASSERT_EQ(AuthTokenTable::OK, table.FindAuthorization(make_set(3), KM_PURPOSE_SIGN, 0, &found));
116 EXPECT_EQ(3U, found->user_id);
117 EXPECT_EQ(4U, found
134 const hw_auth_token_t* found; local
153 const hw_auth_token_t* found; local
225 const hw_auth_token_t* found; local
235 const hw_auth_token_t* found; local
252 const hw_auth_token_t* found; local
262 const hw_auth_token_t* found; local
272 const hw_auth_token_t* found; local
305 const hw_auth_token_t* found; local
[all...]
/system/update_engine/payload_generator/
H A Dcycle_breaker.cc158 bool found = false; // Was "f" in the original paper. local
183 found = true;
186 found = true;
193 if (found) {
208 return found;
/system/bt/stack/a2dp/
H A Da2d_api.c59 BOOLEAN found = FALSE; local
67 /* loop through all records we found */
70 /* get next record; if none found, we're done */
109 found = TRUE;
120 (*a2d_cb.find.p_cback)(found, &a2d_svc);
242 ** returned for the first service record found on the
/system/extras/simpleperf/
H A Dcmd_report_test.cpp123 bool found = false; local
128 found = true;
132 return found;
136 bool found = false; local
141 found = true;
145 return found;
H A Dread_apk.cpp77 bool found = false; local
84 found = true;
89 if (!found) {
93 // We found something in the zip file at the right spot. Is it an ELF?
107 // Elf found: add EmbeddedElf to vector, update cache.
/system/security/keystore/
H A Dauth_token_table.h74 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found);
88 const hw_auth_token_t** found) {
89 return FindAuthorization(AuthorizationSet(params, params_count), purpose, op_handle, found);
148 const hw_auth_token_t** found);
151 const AuthorizationSet& key_info, const hw_auth_token_t** found);
86 FindAuthorization(const keymaster_key_param_t* params, size_t params_count, keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument
H A Dauth_token_table.cpp88 const hw_auth_token_t** found) {
99 return FindAuthPerOpAuthorization(key_sids, auth_type, op_handle, found);
101 return FindTimedAuthorization(key_sids, auth_type, key_info, found);
106 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) {
119 *found = matching_op->token();
126 const hw_auth_token_t** found) {
142 *found = newest_match->token();
168 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); local
169 if (found == entries_.end())
172 assert(!IsSupersededBySomeEntry(*found));
85 FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument
104 FindAuthPerOpAuthorization( const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument
123 FindTimedAuthorization(const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, const AuthorizationSet& key_info, const hw_auth_token_t** found) argument
[all...]
/system/vold/
H A DMoveTask.cpp68 bool found = false; local
75 found = true;
78 return found ? OK : -1;
/system/bt/bta/pan/
H A Dbta_pan_act.c262 BOOLEAN found = FALSE; local
272 found = TRUE;
278 if (found == FALSE)
/system/bt/service/example/heart_rate/
H A Dheart_rate_server.cpp150 bool found = false; local
157 found = true;
172 if (found) {
/system/bt/stack/btm/
H A Dbtm_dev.c68 BOOLEAN found = FALSE; local
118 found = TRUE;
122 if (found)
175 ** Returns TRUE if removed OK, FALSE if not found or ACL link is active
339 BTM_TRACE_DEBUG("btm_dev_support_switch return TRUE (feature found)");
H A Dbtm_ble_adv_filter.c253 ** Returns pointer to the counter if found; NULL otherwise.
366 ** Returns pointer to the counter if found; NULL otherwise.
426 BOOLEAN found = FALSE; local
437 found = TRUE;
443 return found;
717 BTM_TRACE_ERROR("no matching filter counter found");
1073 BTM_TRACE_ERROR("BD Address not found!");
/system/core/logd/
H A DLogReader.cpp165 bool found() { return startTimeSet; } function in class:LogFindStart
173 if (!logFindStart.found()) {
H A DLogBuffer.cpp316 { // start of scope for uid found iterator
317 LogBufferIteratorMap::iterator found = local
319 if ((found != mLastWorstUid[id].end())
320 && (it == found->second)) {
321 mLastWorstUid[id].erase(found);
326 // start of scope for pid found iterator
327 LogBufferPidIteratorMap::iterator found = local
329 if ((found != mLastWorstPidOfSystem[id].end())
330 && (it == found->second)) {
331 mLastWorstPidOfSystem[id].erase(found);
401 LogBufferElement *found = it->second; local
602 LogBufferIteratorMap::iterator found = mLastWorstUid[id].find(worst); local
611 LogBufferPidIteratorMap::iterator found local
[all...]
/system/bt/bta/gatt/
H A Dbta_gattc_utils.c227 APPL_TRACE_DEBUG("bta_gattc_clcb_alloc: found clcb[%d] available",i_clcb);
260 ** Description find or allocate CLCB if not found.
388 BOOLEAN found = FALSE; local
395 found = TRUE;
404 /* if not found, try to recycle one known device */
405 if (!found && !p_recycle)
407 else if (!found && p_recycle)
671 APPL_TRACE_DEBUG("bta_gattc_conn_alloc: found conn_track[%d] available",i_conn);
700 APPL_TRACE_DEBUG("bta_gattc_conn_find: found conn_track[%d] matched",i_conn);
H A Dbta_gattc_act.c1628 BOOLEAN found = FALSE; local
1641 found = TRUE;
1645 if (found)
/system/bt/stack/gatt/
H A Dgatt_db.c1020 BOOLEAN found = FALSE; local
1023 return found;
1034 found = TRUE;
1040 found = TRUE;
1042 /* else attr not found */
1043 if ( found)
1046 return found;
H A Dgatt_main.c225 ** Returns TRUE: if connection found and to be disconnected; otherwise
283 BOOLEAN found=FALSE; local
296 found = TRUE;
305 if (!found && is_add)
312 found = TRUE;
318 GATT_TRACE_DEBUG("gatt_update_app_hold_link_status found=%d[1-found] idx=%d gatt_if=%d is_add=%d", found, i, gatt_if, is_add);
/system/core/init/
H A Daction.cpp137 *err = "property trigger found without matching '='";
146 *err = "multiple property triggers found for same property";
200 bool found = name.empty(); local
208 found = true;
218 return found;
/system/core/adf/libadf/
H A Dadf.c795 bool found = false; local
798 found = adf_find_simple_post_overlay_engine(dev, formats, n_formats,
800 if (found) {
807 if (!found)
/system/extras/f2fs_utils/
H A Df2fs_sparseblock.c308 SLOGE("Valid Checkpoint not found!!");
490 unsigned int used, found, started = 0, i; local
505 found = 0;
509 found = 1;
515 if (!found) {
/system/extras/perfprofd/tests/
H A Dperfprofd_test.cc105 auto found = s.find_last_of("/"); local
106 test_dir = s.substr(0,found);
288 std::cerr << testpoint << ": expected result not found\n";
476 W: line 10: line malformed (no '=' found)

Completed in 614 milliseconds

12